Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 12:58:02 |
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:__is_pointer_value
Proto:static bool __is_pointer_value(bool allow_ptr_leaks, const struct bpf_reg_state *reg)
Type:bool
Parameter:
| Type | Parameter | Name |
|---|---|---|
| bool | allow_ptr_leaks | |
| const struct bpf_reg_state * | reg |
| 2494 | If allow_ptr_leaks Then Return false |
| Name | Describe |
|---|---|
| is_pointer_value | |
| is_branch_taken | mpute branch direction of the expression "if (reg opcode val) goto target;"* and return:* 1 - branch will be taken and "goto target" will be executed* 0 - branch will not be taken and fall-through to next insn* -1 - unknown |
| reg_set_min_max | Adjusts the register min/max values in the case that the dst_reg is the* variable register that we are working on, and src_reg is a constant or we're* simply doing a BPF_K check.* In JEQ/JNE cases we also adjust the var_off values. |
| reg_set_min_max_inv | Same as above, but for the case that dst_reg holds a constant and src_reg is* the variable reg. |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |